[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-243?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Demetrius Tsitrelis updated CLOUDSTACK-243:
-------------------------------------------

         Labels: security  (was: documentation security)
    Description: 
Reference: The JMX Monitoring and Management configuration options are listed 
at http://docs.oracle.com/javase/6/docs/technotes/guides/management/agent.html

The default option values are to allow local connections and, if a remote port 
is later specified, to require password-based authentication and to enable SSL.

CloudStack starts Tomcat (see client/tomcatconf/tomcat6-ssl.conf.in) to enable 
remote connections AND it  explicitly disables all security on that connection:
javax.net.ssl.trustStore=/etc/cloud/management/cloudmanagementserver.keystore
javax.net.ssl.trustStorePassword=vmops.com
com.sun.management.jmxremote.port=45219
com.sun.management.jmxremote.authenticate=false
com.sun.management.jmxremote.ssl=false

Thus remote JMX connections are allowed to the management server without any 
authentication.  Further, SSL has also been disabled, so even if passwords were 
permitted they would be transported unencrypted.

Disabling the default security leaves CloudStack vulnerable to attackers who 
can use the JMX APIs/JConsole, etc. to monitor the system or make changes to it 
through the various MBeans it exposes.

CVSS: (AV:N/AC:M/Au:N/C:P/I:P/A:N), score 5.8

  was:
Tomcat on CloudStack management server is started with 
"-Dcom.sun.management.jmxremote.port=45219 
-Dcom.sun.management.jmxremote.authenticate=false" flag. As a result, the JMX 
port is open without authentication.

Do we need the JMX port? If not, we should close it.

If we need it, we will want to add authentication. Ideally we should add it in 
default installation. Or we should mention it in the document.

        Summary: On management server, security for remote JMX connections is 
disabled  (was: Management Server starts with JMX port open and without 
authentication)
    
> On management server, security for remote JMX connections is disabled
> ---------------------------------------------------------------------
>
>                 Key: CLOUDSTACK-243
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-243
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Install and Setup
>    Affects Versions: 4.0.0
>            Reporter: Clement Chen
>              Labels: security
>             Fix For: 4.1.0
>
>
> Reference: The JMX Monitoring and Management configuration options are listed 
> at http://docs.oracle.com/javase/6/docs/technotes/guides/management/agent.html
> The default option values are to allow local connections and, if a remote 
> port is later specified, to require password-based authentication and to 
> enable SSL.
> CloudStack starts Tomcat (see client/tomcatconf/tomcat6-ssl.conf.in) to 
> enable remote connections AND it  explicitly disables all security on that 
> connection:
> javax.net.ssl.trustStore=/etc/cloud/management/cloudmanagementserver.keystore
> javax.net.ssl.trustStorePassword=vmops.com
> com.sun.management.jmxremote.port=45219
> com.sun.management.jmxremote.authenticate=false
> com.sun.management.jmxremote.ssl=false
> Thus remote JMX connections are allowed to the management server without any 
> authentication.  Further, SSL has also been disabled, so even if passwords 
> were permitted they would be transported unencrypted.
> Disabling the default security leaves CloudStack vulnerable to attackers who 
> can use the JMX APIs/JConsole, etc. to monitor the system or make changes to 
> it through the various MBeans it exposes.
> CVSS: (AV:N/AC:M/Au:N/C:P/I:P/A:N), score 5.8

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to